[0001] The present invention relates to an access limitation method for use in an information
recording/reproducing device that can effectively limit access to data.
[0002] Recently, information processing devices have been improved, and it has become essential
to hold and use information as electronic data that can be read by information processing
devices on the business scene, etc. In such a case, electronic data can be copied
with ease. Therefore, it is necessary to prevent an important document, etc. from
being easily copied, and to guarantee that the document is an original. Normally,
such an important document is held by being encrypted, and only a person who knows
a particular key can decrypt the document. However, if an important document is only
encrypted with a key, anybody can view the document in the case where the key is leaked
out due to some reason or other. Accordingly, to further secure confidentiality, an
access to electronic data is limited by using information specific to a device that
is used to read a medium storing the electronic data.
[0003] Namely, an encrypted code itself generated from an encryption circuit can be leveraged
as an access limitation if a key does not match. Additionally, a medium, to which
device-specific information is written, enables a device to make an access only if
the device matches the written device-specific information. Key information is registered
to an encryption device, which has a mechanism for authorizing the use of a key according
to a user ID/password. Accordingly, if a device such as a PC, an information recording/reproducing
device, etc. is lost or damaged, a device having exactly the same device-specific
information is required. However, there are no alternative methods.
[0004] Conventionally, if a device being a medium reading device such as a PC, an information
recording/reproducing device, etc. becomes unavailable due to a fault, etc., specific
information registered to the device is lost, and there are no measures to restore
the information. Since a function for reading device-specific information does not
exist, device-specific information must be directly written to a corresponding device.
If attempts are made to register specific information to a device at a remote site
or many devices, this requires much labor.
[0005] Additionally, if an encryption device is stolen, and its key information is also
stolen, data can be decrypted and viewed. It is possible to implement a configuration
where device-specific information is written to a medium, which can be read only by
a device having the written device-specific information. However, if only information
specific to one device is written to a medium, and if the device is damaged, the medium
can never be used.
[0006] It is desirable to provide an information recording/reproducing system that enables
an access to a medium despite an occurrence of a fault, while still effectively limiting
access.
[0007] A first system according to the present invention is an information recording/reproducing
system that can limit an access to encrypted data. This system may comprise: a first
storing unit storing, in an encryption device for encrypting/decrypting data, encryption-circuit-specific
information for identifying the encryption device, shared information including one
or more pieces of device-specific information of devices that can be used to read
a medium by being connected to the encryption device, and/or one or more pieces of
key information for encrypting/decrypting data; a second storing unit storing, on
the medium, encryption circuit specification information for identifying an encryption
device to be used when the data is encrypted/decrypted; a detecting unit for detecting
a match between the shared information of the encryption device and the information
specific to a device used to access the encrypted data, and/or for detecting a match
between the encryption-circuit-specific information and the encryption circuit specification
information, when access is made to the encrypted data; and a restoring unit for prestoring
the encryption-circuit-specific information of the encryption device, the shared information,
and/or the key information at a predetermined site through a network, restoring the
shared information and the key information to a new encryption device from the predetermined
site, and allowing only the new encryption device, to which the information is restored,
to access the encrypted data, when the encryption circuit becomes unavailable.
[0008] A second system according to the present invention is an information recording/reproducing
system that can limit an access to encrypted data. This system may comprise: a first
storing unit storing, in a device having an encryption circuit for encrypting/decrypting
data, device-specific information for identifying the device, and/or one or more pieces
of key information for encrypting/decrypting data stored on a medium; a second storing
unit storing, on the medium, shared information for identifying a device to be used
when the encrypted data is encrypted/decrypted; a detecting unit for detecting a match
between the shared information and device-specific information of a device used to
access the encrypted data, when access is made to the encrypted data; and a restoring
unit prestoring the device-specific information of the device and the key information
at a predetermined site through a network, respectively restoring the shared information
and the key information to the medium and a new device from the predetermined site,
and allowing only the new device and the medium, to which the information are restored,
to access the encrypted data, when the device becomes unavailable.
[0009] According to the present invention, with a method limiting an access by using device-specific
information, etc. in addition to an encryption key, even if a device having device-specific
information is lost, an access can be made to encrypted data with a new device by
registering information to a predetermined site connected via a network, and by restoring
the information to the new device.
[0010] Accordingly, it is possible to provide a system that can securely perform restoration
operations in cases such as the case where a device is lost, or the like, and can
limit an access while securing the confidentiality of encrypted data.
[0011] Preferred features of the present invention will now be described, purely by way
of example, with reference to the accompanying drawings, in which:
Fig. 1 shows the configuration of a system in the case where an encryption device
is external to an information recording/reproducing device;
Fig. 2 shows the configuration of a system in the case where an encryption device
is included in an information recording/reproducing device;
Fig. 3 is a flowchart showing the operations for recording/reproducing data, according
to a preferred embodiment of the present invention (No. 1);
Fig. 4 is a flowchart showing the operations for recording/reproducing data, according
to the preferred embodiment of the present invention (No. 2);
Fig. 5 shows encryption and decryption flows in a system of an external circuit type;
Fig. 6 shows encryption and decryption flows in a system of an internal circuit type;
Fig. 7 shows the mechanism for limiting an access based on the identity of a device,
according to the preferred embodiment of the present invention (No. 1);
Fig. 8 shows the mechanism for limiting an access based on the identity of a device,
according to the preferred embodiment of the present invention (No. 2);
Fig. 9 shows the mechanism for limiting an access based on the identity of a device,
according to the preferred embodiment of the present invention (No. 3);
Fig. 10 shows the mechanism for limiting an access based on the identity of a device,
according to the preferred embodiment of the present invention (No. 4);
Fig. 11 shows the mechanism for limiting an access based on the identity of a device,
according to the preferred embodiment of the present invention (No. 5);
Fig. 12 shows the mechanism for limiting an access based on the identity of a device,
according to the preferred embodiment of the present invention (No. 6);
Fig. 13 shows the mechanism for limiting an access based on the identity of a device,
according to the preferred embodiment of the present invention (No. 7);
Fig. 14 explains the operations performed by the external circuit type apparatus when
specific information is managed at a net authentication site;
Fig. 15 explains the operations performed by the internal circuit type apparatus when
specific information is managed at a net authentication site;
Fig. 16 is a flowchart showing the operations performed at the net authentication
site (No. 1);
Fig. 17 is a flowchart showing the operations performed at the net authentication
site (No. 2);
Fig. 18 is a flowchart showing the operations performed at the net authentication
site (No. 3);
Fig. 19 is a flowchart showing the operations performed at the net authentication
site (No. 4);
Fig. 20 is a flowchart showing the operations performed at the net authentication
site (No. 5);
Fig. 21 is a flowchart showing the operations performed at the net authentication
site (No. 6);
Fig. 22 shows the restoration operations performed by the internal circuit type apparatus;
Fig. 23 shows the restoration operations performed by the external circuit type apparatus;
Fig. 24 is a flowchart showing the process performed at the net authentication site
when a specific information restoration menu item is selected for the internal circuit
type apparatus;
Fig. 25 is a flowchart showing the process performed at the net authentication site
when a specific information restoration menu item is selected for the external circuit
type apparatus; and
Fig. 26 exemplifies the configuration of a database possessed by a net authentication
site.
[0012] According to a preferred embodiment of the present invention, a device limitation
function is enhanced by making also an encryption device possess specific information.
Additionally, an encryption device can be specified by making a data side possess
specific information of an encryption device. Furthermore, specific information is
held at a third site (such as a net authentication site, etc.). Even if an access
is denied due to a mismatch of device-specific information, a write of restoration
information, and an addition of device-specific information can be implemented via
the net authentication site.
[0013] Fig. 1 shows the configuration of a system in the case where an encryption device
is external to an information recording/reproducing device, whereas Fig. 2 shows the
configuration of a system in the case where an encryption device is included in an
information recording/reproducing device.
[0014] In Fig. 1, an encryption device 10 and a PC or an information recording/reproducing
device 11 are connected. For the device 11, an internal information recording/reproduction
mechanism 16 or an external database 15 is arranged. Encrypted data is stored on a
storage medium of the internal information recording/reproduction mechanism 16 or
a storage medium of the external database 15. The external database 15 is connected
to the device 11 via a LAN, a telephone line, etc. At this time, device-specific information
such as a device number for uniquely identifying a PC or an information recording/reproducing
device, which can be used to read encrypted data, and the like are stored in the device
11. In the encryption device 10, encryption-circuit-specific information, shared information,
and key information in addition to the encryption circuit are included. Here, the
encryption-circuit-specific information is a device number for uniquely identifying
an encryption circuit, or the like, and the shared information is a device number
for uniquely identifying a PC or an information recording/reproducing device, which
can be used along with the encryption circuit to read encrypted data, and a plurality
of pieces of shared information can be registered. The key information is information
in which a key used when encrypted data is actually decrypted is registered.
[0015] In the system of the internal encryption circuit type shown in Fig. 2, an encryption
circuit 14 is included in an information recording/reproducing device 12. In the information
recording/reproducing device 12, key information for decrypting encrypted data is
included in addition to the encryption circuit 14, and device-specific information
is set in a similar manner as in the case of Fig. 1. In the information recording/reproducing
device 12, an information recording/reproduction mechanism 17 is arranged, and a portable
storage medium 13 storing encrypted data and shared information is inserted into.
Examples of the portable storage medium 13 include a CD-ROM, a DVD, a flexible disk,
etc.
[0016] In any configuration, the encryption circuit has encryption-circuit-specific information,
and the device 11 or 12 has device-specific information. Note that, however, the internal
encryption circuit type stores not encryption circuit information, but only device-specific
information. This is because the encryption circuit alone cannot be separated physically.
[0017] Figs. 3 and 4 are flowcharts showing the operations for recording/reproducing data,
according to the preferred embodiment of the present invention.
[0018] Firstly, a user inputs a user ID and a password to an encryption circuit in step
S10. Next, in step S11, the encryption circuit examines the user ID and the password,
and determines whether or not the user is a person who is authorized to use the encryption
circuit. If the user is not a person who is authorized to use the encryption circuit,
the encryption circuit denies an access.
[0019] If it is determined that the user is a person who is authorized to use the encryption
circuit, key information used for encryption/decryption is selected in step S12. Then,
in step S13, a read or a write command is received from a host (the host referred
to here is a PC used by the user or an information processing device having a user
interface, which is connected to an information recording/reproducing device, and
is a device that is connected to an encryption device and the information recording/reproducing
device, which execute an instruction to encrypt and store data, and an instruction
to read and decrypt encrypted data) . Then, in step S14, encryption circuit specification
information is obtained.
[0020] In step S15, it is determined whether or not the encryption circuit specification
information exists. If it is determined that the encryption circuit specification
information does not exist, the process proceeds to step S18. If it is determined
that the encryption circuit specification information exists in step S15, it is further
determined whether or not the encryption circuit specification information matches
encryption-circuit-specific information in step S16. If the result of the determination
made in step S16 is "NO", it is determined whether or not data matching the encryption
circuit specification information exists within shared information in step S17.
[0021] If the result of the determination made in step S17 is "NO", an access is denied.
If the result of the determination is "YES" in step S17, the process proceeds to step
S18. If the result of the determination made in step S16 is "YES", the process also
proceeds to step S18.
[0022] In step S18, it is determined whether or not information matching device-specific
information exists within the shared information. If the result of the determination
made in step S18 is "NO", an access is denied. If the result of the determination
made in step S18 is "YES", an access to data is authorized in step S19. The process
then proceeds to step S20.
[0023] In step S20, the command received from the host (defined as described above) is executed.
In step S21, it is determined whether or not a change occurs in the shared information.
If the result of the determination made in step S21 is "NO", an access is denied.
If the result of the determination made in step S21 is "YES", it is further determined
whether or not a change occurs in the access specification information in step S22.
If the result of the determination made in step S22 is "NO", an access is denied.
If the result of the determination made in step S22 is "YES", the process goes back
to step S20 in which another command is executed. This process is repeated until all
of commands are executed.
[0024] Fig. 5 shows the encryption and decryption flows in the system of the external circuit
type, whereas Fig. 6 shows the encryption and decryption flows in the system of the
internal circuit type.
[0025] In the encryption flow shown in Fig. 5, when a write command is issued from the host
in step S30, the PC or the information recording/reproducing device (referred to simply
as a device) once receives the command in step S31. In step S32, data is transferred
from the device to the encryption device. In step S33, the received data is encrypted
with key information. In step S34, the encrypted data is transferred to the device.
In step S35, the device receives the encrypted data by the length specified by the
command. In step S36, the encrypted data is written to a medium. In step S37, normal
termination is notified to the host. Here, the process is terminated.
[0026] In the decryption flow shown in Fig. 5, a read command is issued from the host in
step S40. In step S41, the encrypted data is read from the medium. In step S42, the
data is transferred from the device to the encryption device. In step S43, the received
data is decrypted with the key information. In step S44, the decrypted data is transferred
to the device. In step S45, the device receives the decrypted data by the length specified
by the command. In step S46, the decrypted data is transferred to the host, and normal
termination is notified.
[0027] In the decryption flow in the case of the internal circuit type in Fig. 6, when a
write command is issued from the host in step S50, received data is encrypted with
key information in step S51. Then, in step S52, the encrypted data is written to a
medium. In step S53, normal termination is notified to the host, and the process is
terminated.
[0028] In the decryption flow, when a read command is issued from the host in step S55,
the encrypted data is read from the medium in step S56. In step S57, the received
data is decrypted with the key information. In step S58, the decrypted data is transferred
to the host, and normal termination is notified to the host. Here, the process is
terminated.
[0029] Figs. 7 to 13 explain the mechanism for limiting an access based on the identity
of a device, according to the preferred embodiment of the present invention.
[0030] Fig. 12 explains the mechanism for imposing a limitation on a device in the system
having the configuration shown in Fig. 1 or 2. Shared information shown in Fig. 12
must be preregistered to the encryption device side or the device side with the method
shown in Fig. 7 or 8. Inversely, Fig. 13 shows that an encryption device used can
be specified from a data side. An encryption device used must be written to target
data beforehand with the method shown in Fig. 9.
[0031] The encryption circuit is required to encrypt data with a key. This preferred embodiment
adopts an existing method with which key information is stored on the side of the
encryption circuit as shown in Figs. 10 and 11, and the encryption function can be
used only by specifying a key number from the host without inputting the key information.
[0032] A write of shared information in the external circuit type in which the encryption
device is arranged as an external circuit is made as shown in Fig. 7. Firstly, the
host PC obtains device-specific information by communicating the device-specific information
with the device (information recording/reproducing device) (1). Next, the host PC
issues an instruction to write shared information to the encryption device, which
writes as the shared information the obtained device-specific information to a memory
such as a flash ROM, etc. of the encryption device (2).
[0033] In the internal circuit type in which the encryption device is arranged within the
device (information recording/reproducing device), as shown in Fig. 8, the host PC
directly issues to the device an instruction to write device-specific information
to a portable storage medium which is inserted into the device, and the device is
made to store the device-specific information as shared information on the portable
storage medium (1).
[0034] Additionally, in the external circuit type, information specific to the encryption
device is used to limit an access, since the encryption device is external to the
device. Namely, as shown in Fig. 9, the host PC communicates with the encryption device,
and obtains encryption-circuit-specific information (1). Then, the host PC issues
an instruction to write the encryption-circuit-specific information, so that the encryption-circuit-specific
information or its accompanying information is written to a memory, etc. (2).
[0035] Furthermore, a write of key information is made as shown in Figs. 10 and 11. Fig.
10 shows the case of the external circuit type, whereas Fig. 11 shows the case of
the internal circuit type. In the case of the external circuit type, as shown in Fig.
10, an instruction to write key information is issued from the host PC to the encryption
device, so that the key information is written to a memory within the encryption device
(1). In the case of the internal circuit type, as shown in Fig. 11, an instruction
to write key information is issued from the host PC to the device, so that the key
information is written to a key information storage area within the device.
[0036] Fig. 12 explains the mechanism for imposing a limitation on a device. (a) in Fig.
12 shows the case where an access is authorized, whereas (b) in Fig. 12 shows the
case where an access is denied. Firstly, a host PC obtains shared information of the
encryption device (1). Then, the shared information is transmitted from the host PC
to the device. Upon receipt of the shared information, the device verifies whether
or not information within the shared information matches the device-specific information
of a device A itself. In the case of (a) in Fig. 12, the shard information is "AAAA",
and also the device-specific information is "AAAA". Therefore, the device A can access
encrypted data (not shown).
[0037] In the meantime, in the case of (b) in Fig. 12, the host PC also obtains the shared
information of the encryption device (1), and a comparison is made between device-specific
information "BBBB" of a device B and the shared information "AAAA". In this case,
these information do not match, an access with the device B is denied (2).
[0038] Fig. 13 explains an access limitation based on the identification of an encryption
device. (a) in Fig. 13 shows the case where an access is authorized, whereas (b) in
Fig. 13 shows the case where an access is denied. Firstly, the host PC obtains encryption-circuit-specific
information from an encryption device A (1), and transmits the encryption-circuit-specific
information to the device. The device makes a comparison between the encryption circuit
specification information stored on the medium inserted into the internal information
recording/reproduction mechanism and the received encryption-circuit-specific information,
and authorizes an access if they match. In this case, the encryption-circuit-specific
information "AAAA" matches the encryption circuit specification information "AAAA".
Therefore, an access can be made to the encrypted data stored on the medium which
is inserted into the information recording/reproduction mechanism by using the encryption
device A (2).
[0039] In the meantime, in the case of (b) in Fig. 13, encryption-circuit-specific information
"BBBB" that the host PC obtains from an encryption device B (1), and transmits to
the device does not match encryption circuit specification information "AAAA" set
in the device. Therefore, an access to encrypted data with an encryption device B
is denied.
[0040] With these functions, some pieces of information specific to the encryption device
or the device come to exist within these devices. However, if the devices are damaged
or lost, there are no ways to learn such information.
[0041] Accordingly, a means for absorbing specific information by setting up a net authentication
site is prepared as shown in Fig. 14. Fig. 15 shows the case of the internal circuit
type.
[0042] Fig. 14 explains the operations for managing specific information at a net authentication
site, which are performed in the external circuit type, whereas Fig. 15 explains the
operations for managing specific information at a net authentication site, which are
performed in the internal circuit type.
[0043] In Fig. 14, a user connects his or her host PC to an information registration management
center or a net authentication site via a telephone line, a LAN, etc. To connect the
host PC to the net authentication site, a user ID and a password, which are unique
to the user, are required. Then, according to a menu at the net authentication site,
encryption-circuit-specific information, shared information, and key information are
obtained from the encryption device connected to the host PC, and registered to a
database at the net authentication site. In this case, an access range of the database
at the net authentication site is limited for each user. If an access is made with
a predetermined user ID and password, only information of the user corresponding to
the user ID and password is made accessible.
[0044] Here, the user ID and password are issued by a network side in this preferred embodiment.
When a user is authorized to use a network, he or she can access a net authentication
site. At this time, a user ID and a password are obtained as communication information
at the net authentication site, and it is determined whether or not to authorize the
user to access the database possessed by the net authentication site. Or, if the user
ID and the password are illegal, the user cannot make a connection to the network.
Accordingly, the user cannot also access the database at the net authentication site.
[0045] In Fig. 15, a user also accesses a net authentication site with a user ID and a password,
obtains device-specific information and key information according to a menu at the
net authentication site, and registers the obtained information to a database at the
net authentication site. The access range of this database is limited for each user
as described above. Here, shared information is not registered to the database at
the net authentication site. The reason is as follows. Shared information is stored
on a portable storage medium in the case of the internal circuit type. However, it
is considered to be impractical to insert into the device all of portable storage
media that can possibly be used by the device and to register information. Therefore,
only the device-specific information and the key information, which are possessed
by the device, are registered.
[0046] The net authentication site renders a service that can register/update, restore,
delete, and lock information according to the circumstances.
Functions of the Net Authentication Site
[0047]
(1) Registering/updating specific information from the device or the encryption circuit.
(2) Restoring specific information to the device or the encryption circuit.
(3) Deleting specific information from the database.
(4) Locking information in the database.
- at the time of new registration/information update
A user ID/password are set, and specific information is registered with the function
(1).
- In the case where the device or the encryption circuit is lost
Information in the database is temporarily locked (4). This operation prevents the
information from being used by registering a user ID/password with an alias, if a
third person obtains a lost device or circuit. The database monitors whether or not
device-specific information is redundant within the entire registered information.
- In the case where registered data becomes unnecessary
Corresponding information is deleted from the database with the function (3).
- In the case where specific information is restored to an alternative to a lost device
or encryption circuit
Specific information is restored with the function (2). For the external circuit type,
information (shared information and key information) except for encryption-circuit-specific
information are restored to the encryption device. For the internal circuit type,
(1) "restoration of specific information" is selected from a net authentication site.
(2) data used by the previous device is mounted in the new device.
(3) shared information within the mounted data is read and transmitted to the net
authentication site.
(4) after the mounted data is verified to be the one for the previously used device
as a result of a comparison with the database
(5) shared data is additionally written to the data mounted in the device via the
host PC (the information becomes available to the new device).
[0048] Figs. 16 to 21 are flowcharts showing the processes performed at the net authentication
site.
[0049] Figs. 16 and 17 show the entire process flows.
[0050] Firstly, in step S60, a connected user is instructed to input a user ID and a password.
In step S61, it is determined whether or not the user is a user who is registered
to the database. If the result of the determination made in step S61 is "NO", an area
is secured in the database, and the user ID and the password are registered in step
S62. The process then proceeds to step S63. At this time, the access range of the
data base is limited according to the given user ID and password as described above.
If the result of the determination is "YES" in step S61, the process proceeds to step
S63.
[0051] In step S63, information specific to the device used by the user is obtained. In
step S64, the information specific to the device used by the user is compared with
the database. In step S65, it is determined whether or not the information specific
to the device that the user currently uses exists in the database.
[0052] If the result of the determination made in step S65 is "NO", the process proceeds
to step S66. If the result of the determination is "YES", the process proceeds to
step S67. In step S66, a selectable menu item is limited to information registration
or information lock. In step S67, no limitations are imposed on a selectable menu
item.
[0053] Then, in step S68, database management menu items are displayed. In step S69, a user
selects a menu number. In step S70, which menu item is selected is determined. In
step S71, a registration/update menu item for specific information is executed. In
step S72, a restoration menu item for the specific information is executed. In step
S73, a deletion menu item from the database is executed. In step S74, an information
lock menu item is executed. If none of the menu items are selected, a process for
monitoring the redundancy of registered data is performed in step S75. The process
then goes back to step S60.
[0054] Fig. 18 is a flowchart showing the process for monitoring the redundancy of registered
data in the database.
[0055] In step S80, information whose monitoring flag is set to ON is searched in the entire
database. In step S81, it is determined whether or not the information whose monitoring
flag is set to ON exists. If the result of the determination made in step S81 is "NO",
the process is terminated. If the result of the determination made in step S81 is
"YES", a search is made as to whether or not device-specific information whose monitoring
flag is set to ON is registered by a different user in step S82. In step S83, it is
determined whether or not the device-specific information whose monitoring flag is
set to ON is registered by a different user. If the result of the determination is
"NO", the process is terminated. If the result of the determination is "YES", the
process proceeds to step S84. In step S84, the fact that the device-specific information
whose monitoring flag is set to ON is registered is notified to the administrator
of the database, and e-mail notifying this fact is issued to the registered user of
the device. Here, the process is terminated.
[0056] Fig. 19 is a flowchart showing the process performed when an information registration
menu item is selected.
[0057] In step S90, information specific to a device used by a user is obtained. In step
S91, the information specific to the device used by the user is compared with the
database. In step S92, it is determined whether or not the information specific to
the device matches the information to be monitored within the database (monitored
information: registered device-specific information, etc.). If the result of the determination
made in step S92 is "YES", the possibility that the lost device is registered by a
third person is determined to exist. In step S94, warning is issued to the currently
connected user. Additionally, this fact is logged and notified to the registered person
of the device via e-mail. No operation is performed in step S95, and the display is
reset to the initial screen.
[0058] If the result of the determination is "NO" in step S92, device-specific information,
etc. are obtained from the connected device of the user in step S96. In step S97,
a registration number is assigned to the specific information, etc., and written to
the database. In step S98, the registration number generated by the database is notified
to the user. Then, in step S99, the registration process of the specific information
is terminated.
[0059] Fig. 20 is a flowchart showing the process performed when an information lock menu
item is selected.
[0060] In step S110, a user is made to input the registration number of a device to be locked.
In step S111, it is determined whether or not an input number exists in the data registered
by the user. If the result of the determination made in step S111 is "NO", a lock
operation is not performed and the process is terminated in step S112. Then, the display
is reset to the initial screen.
[0061] If the result of the determination made in step S111 is "YES", only specific information
within the data of the target registration number is set as monitored information
in step S113. Then, in step S114, the user is made to input a valid term during which
the information is locked. In step S115, the valid term is registered to the database,
and the monitoring flag is set to ON. Then, in step S116, the information lock process
is terminated.
[0062] Fig. 21 is a flowchart showing the process performed when an information deletion
menu item is selected.
[0063] In step S120, information specific to a device used by a user is obtained. In step
S121, the information specific to the device used by the user is compared with the
database. Then, in step S122, it is determined whether or not a deletion target is
the currently connected device. If the result of the determination made in step S122
is "YES", a move is made to the position of the database, to which the information
specific to the currently connected device is registered. The process then proceeds
to step S127. If the result of the determination made in step S122 is "NO", it is
further determined whether or not the deletion target is the device the information
of which is locked. If the result of the determination made in step S124 is "NO",
a deletion operation is not performed in step S125, and the display is reset to the
initial screen. If the result of the determination made in step S124 is "YES", a move
is made to the position of the database, at which the monitoring flag is set to ON.
The process then proceeds to step S127.
[0064] In step S127, only the shared information and the key information at the corresponding
position are deleted. In step S128, the deletion process for the specific information
is terminated.
[0065] For example, if an encryption device is lost in the state where information is registered
to a net authentication site, an encryption device can be restored to almost the same
state by writing information (shared information and key information) except for encryption-circuit-specific
information. Here, the reason that the encryption-circuit-specific information is
not written is to prevent a plurality of identical encryption devices from existing
when viewed from the specific information, if the encryption device is found afterward.
[0066] Fig. 22 shows the restoration operations performed by the internal circuit type,
whereas Fig. 23 shows the restoration operations performed by the external circuit
type.
[0067] In the case of the internal circuit type shown in Fig. 22, "restoration of specific
information" is first selected from a menu at a net authentication site (1). At this
time, data used by a previous device is mounted in a device (2). Next, shared information
within the mounted data is read and transmitted to the net authentication site (3).
If the device is determined to be an alternative to the previously used device as
a result of the comparison with the database (4), the shared information is additionally
written to the data mounted in the device via the host PC (a write of "EEEE") (5).
[0068] In the case of the external circuit type shown in Fig. 23, "restoration of specific
information" is selected from a menu at a net authentication site (1). Then, encryption
circuit specification information is read and transmitted to the net authentication
site (2). At the net authentication site, a comparison is made between a database
and the encryption circuit specification information, so that it is verified whether
or not the current encryption circuit specification information indicates the encryption
circuit possessed by a user (3). If a match is found as a result of the comparison,
registered shared information and key information are written to the encryption circuit
(4). Furthermore, information specific to the alternative encryption circuit is additionally
written via the host PC (5). In this case, encryption circuit specification information
"AAAA" is written as the shared information of the encryption device.
[0069] Fig. 24 is a flowchart showing the process performed at a net authentication site
when a specific information restoration menu item is selected for the internal circuit
type. Fig. 25 is a flowchart showing the process performed at a net authentication
site when a specific information restoration menu item is selected for the external
circuit type.
[0070] In the case of the internal circuit type, as shown in Fig. 24, a request to mount
data used by a previous device in the device is issued in step S130. Then, in step
S131, it is determined whether or not the data is mounted in the device. If the result
of the determination made in step S131 is "NO", the process proceeds to step S132.
[0071] In step S132, the execution of the menu item is aborted, and an instruction indicating
whether or not to reset to the initial screen, which is issued from a user, is waited.
If the instruction to reset to the initial screen is issued in step S132, the display
is reset to the initial screen. If the display is not reset to the initial screen
in step S132, the process goes back to step S130.
[0072] If the result of the determination made in step S131 is "YES", shared information
within the mounted data is read in step S133. In step S134, device-specific information
is searched in the data registered by the log-in user. Then, in step S135, it is determined
whether or not matching information is found. If the result of the determination made
in step S135 is "NO", no operation is performed and the process is terminated in step
S136. This is because the log-in user does not have a registration history. The display
is then reset to the initial screen.
[0073] If the result of the determination made in step S135 is "YES", information specific
to the new device is additionally written to the shared information within the mounted
data in step S137. In step S138, key information is restored to the new device. Then,
in step S139, the restoration operations for the specific information are terminated.
[0074] In the case of the external circuit type, as shown in Fig. 25, a request to mount
data used by a previous device in the new device is made in step S145. In step S146,
it is determined whether or not the data is mounted in the device. If the result of
the determination made in step S146 is "NO", the execution of the menu item is aborted,
and an instruction indicating whether or not to reset to the initial screen is received
from a user. If the instruction indicates the reset to the initial screen, the display
is reset to the initial screen. Otherwise, the process goes back to step S145.
[0075] If the result of the determination made in step S146 is "YES", encryption circuit
specification information within the mounted data is read in step S148. Then, in step
S149, encryption-circuit-specific information is searched in the data registered by
the log-in user in step S149. Then, in step S150, it is determined whether or not
matching information is found. If the result of the determination made in step S150
is "NO", the process proceeds to step S151 in which no operation is performed and
the process is terminated. This is because the user does not have a registration history.
The display is then reset to the initial screen.
[0076] If the result of the determination made in step S150 is "YES", shared information,
etc. are restored to the encryption device, and the information specific to the new
encryption device is additionally written to the shared information in step S152.
In step S153, the restoration process of the specific information is terminated.
[0077] Fig. 26 exemplifies the configuration of a database possessed by a net authentication
site.
[0078] The database provides one management area per log-in user, and a log-in user uses
his or her area. Note that, however, a log-in user cannot search and view information
of other users. A log-in user can register a plurality of devices. A monitoring flag
is set to ON if information is locked, and set to OFF when a valid term expires. A
device is considered to be missing if the monitoring flag continues to be ON. If a
different user attempts to register the device-specific information whose monitoring
flag is set to ON, the database side denies the registration in order to prevent abuse
by a third person.
[0079] As the contents registered to the database, a user ID being log-in information, password,
registration number, monitoring flag, valid term, encryption-circuit-specific and
device-specific information, shared information, and key information are stored in
each management section.
[0080] By imposing a limitation on a device and an encryption device, the missing of a device
can be coped with, and abuse with a different device can be prevented. Additionally,
specific information can be managed at a third location (net authentication site,
etc.). If specific information is registered to a net authentication site, information
specific to a lost device can be restored. Namely, even if a device is lost, a shift
to an alternative device can be made with a restoration function.
1. An information system being able to limit access to encrypted data, comprising:
storing means for storing, in an encryption device for encrypting/decrypting data,
encryption-circuit-specific information for identifying the encryption device, and
one or more pieces of key information for encrypting/decrypting data;
detecting means for detecting a match between the encryption-circuit-specific information
and encryption circuit specification information which identifies an encryption device
to be used for encrypting/decrypting data, when the encrypted data is accessed; and
restoring means for prestoring the device-specific information of the encryption device
and the key information at a predetermined site through a network, and restoring at
least the key information to a new encryption device from the predetermined site when
the encryption device becomes unavailable, whereby allowing only the new encryption
device, to which the information is restored, to access the encrypted data.
2. An information system being able to limit an access to encrypted data, comprising:
storing means for storing, in a device having an encryption circuit for encrypting/decrypting
data, device-specific information for identifying the device, and one or more pieces
of key information for encrypting/decrypting data stored on a medium;
detecting means for detecting a match between shared information which identifies
devices which can be used to read the medium and device-specific information of a
device used to access encrypted data, when the encrypted data is accessed; and
restoring means for prestoring the device-specific information of the device and the
key information at a predetermined site through a network, and respectively restoring
at least the key information to the medium and a new device from the predetermined
site when the device becomes unavailable, whereby allowing only the new device and
the medium, to which the information are restored, to access the encrypted data.
3. The system according to claim 1 or 2, wherein
when an access is made to a database storing respective information at the predetermined
site, a user desiring to make the access is identified with a user ID and a password,
and is authorized to make the access.
4. The system according to claim 3, wherein
a limitation of an accessible range of data in the database is imposed on the user.
5. The system according to claim 3 or 4, wherein
the information of the database cannot be accessed for a predetermined time period
according to user specification.
6. The system according to claim 3, 4 or 5, wherein the user can store information of
a plurality of devices or a plurality of encryption devices at a predetermined site.
7. A net information storing device, comprising
storing means for storing encryption-circuit-specific information for identifying
an encryption device, one or more pieces of device-specific information of devices
that can be used to read a medium by being connected to the encryption device, and
one or more pieces of key information for decrypting/encrypting data, the information
being transmitted through a network.
8. The device according to claim 7, wherein
whether or not a redundant registration exists in registered information within
a database is periodically examined.
9. The device according to claim 7 or 8, wherein
the information of said storing means cannot be accessed for a predetermined time
period according to user specification.
10. The device according to claim 7, 8 or 9, wherein,
if identification information of a user who uses the net information storing device
is illegal, a limitation of an access to the information stored by the net information
storing device through the network is imposed on the user.
11. A method of renewing an encryption device, comprising the steps of:
storing encryption-circuit-specification information for identifying an encryption
device and at least a key information of the encryption device at a predetermined
site through a network; and
restoring at least the key information to a new encryption device from the predetermined
site when the encryption device becomes unavailable, whereby only the new device,
to which the information is restored, is allowed to access the encrypted data.
12. The method according to claim 11, wherein,
when an access is made to a database storing respective information at the predetermined
site, a user desiring to make the access is identified with a user ID and a password,
and is authorized to make the access.
13. The method according to claim 12, wherein
a limitation of an accessible range of data in the database is imposed on the user.
14. The method according to claim 12 or 13, wherein
the user can store information of a plurality of devices or a plurality of encryption
devices at a predetermined site.
15. A method of renewing an encryption device, comprising the steps of:
storing device-specific information for identifying a device which has an encryption
device, and key information to a medium at a predetermined site through a network;
respectively restoring the key information to the medium and a new device from the
predetermined site when the device becomes unavailable, whereby only the new device,
to which the information are restored, is allowed to access the encrypted data in
the medium.
16. The method according to claim 15, wherein,
when an access is made to a database storing respective information at the predetermined
site, a user desiring to make the access is identified with a user ID and a password,
and is authorized to make the access.
17. The method according to claim 16, wherein
a limitation of an accessible range of data in the database is imposed on the user.
18. The method according to claim 16 or 17, wherein
the information of the database cannot be accessed for a predetermined time period
according to user specification.
19. The method according to claim 16, 17 or 18, wherein
the user can store information of a plurality of devices or a plurality of encryption
devices at a predetermined site.